Top Banner
CS 4594 Broadband ATM GCRA and Leaky Bucket
21

CS 4594 Broadband

Jan 30, 2016

Download

Documents

kuper

CS 4594 Broadband. ATM GCRA and Leaky Bucket. From the ATM Forum. The GCRA is used to define conformance to the traffic contract. For each cell that arrives at the specified point, the GCRA determines whether the cell conforms to the traffic contract of its connection. - PowerPoint PPT Presentation
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: CS 4594 Broadband

CS 4594 Broadband

ATM GCRA and Leaky Bucket

Page 2: CS 4594 Broadband

From the ATM Forum

• The GCRA is used to define conformance to the traffic contract. For each cell that arrives at the specified point, the GCRA determines whether the cell conforms to the traffic contract of its connection.

Page 3: CS 4594 Broadband

Generic Cell Rate Algorithm

• GCRA = Generic Cell Rate Algorithm

• Defined by two equivalent methods– Virtual Scheduling– Leaky Bucket

Page 4: CS 4594 Broadband

GCRA – Virtual Scheduling

Arrival of cell k at t =ta(k)

TAT<ta(k)

TAT>ta(k)+L

TAT=TAT+I

TAT=ta(k)

Discard nonconforming cell

Yes

No

Yes

No

Accept conforming cell

k=k+1

Initially:

TAT=ta(1)

Page 5: CS 4594 Broadband

GCRA - Virtual Scheduling

Arrival of cell k at t =ta(k)

TAT<ta(k)

TAT>ta(k)+L

TAT=TAT+I

TAT=ta(k)

Discard nonconforming cell

Yes

No

Yes

No

Accept conforming cell

k=k+1

TAT-L TAT

fasttoo fast slow(slow)

(fast)

(too fast)

(not too fast)

CGRA(I,L)

Page 6: CS 4594 Broadband

TAT = Theoretical Arrival Time

TATTAT-LTATTAT-L

time

II

slowfasttoo fast

I I

)()()(),(

)()()()(,)(

)()()(,)(

)1(

fasttooLkTATktifkTAT

fastkTATktLkTATifIkTAT

slowktkTATifIkt

kTAT

a

a

aa

Page 7: CS 4594 Broadband

Burst Size

T

N 1

• GCRA(T, τ)• N = maximum number of contiguous conforming cells• T = targeted average time in GCRA• τ = limit tolerance in GCRA• δ = actual average arrival time

Page 8: CS 4594 Broadband

Leaky Bucket

• Smoothes traffic

• Regulates traffic

• Overflow = nonconforming

• Nonconforming can be tagged or discarded

Page 9: CS 4594 Broadband

GCRA – Leaky Bucket (Equiv to Virtual Scheduling)

Arrival of cell k at t =ta(k)

X’<0

X’>L

X=X’+ILCT=ta(k)

X’=0

Discard nonconforming cell

Yes

NoYes

No

Accept conforming cell

k=k+1

(slow)

(fast)

(too fast)

(not too fast)

X’=X-(ta(k)-LCT)

Initially:

X=0

LCT = ta(1)

Meanings:

X = Value of counter

X’ auxiliary variable

LCT = Last Conformance Time

L = bucket size

Page 10: CS 4594 Broadband

Explanation

• X is value of the counter.• When a cell arrives at time ta(k), X’ is set to the value of

what the counter would be: X’ = X – (ta(k) – LCT) (This is the value of previous counter X minus the amount would have leaked.

• If X’ is negative (bucket would be empty), the cell is compliant, X’ is set to 0, X is set equal to X’ + I, and LCT = ta(k).

• If X’ is nonnegative, check if bucket is full. If not full, cell is compliant and do as above.

• If bucket is full, the cell is not compliant, and nothing is updated.

Page 11: CS 4594 Broadband

Leaky (token) bucket as a gate

• ir = information rate• bs = burst size

?yes

bs

ir

Let token escape as cell goes by

Tokens enter at given rateCell goes through if bucket has enough tokens

no

input output

Page 12: CS 4594 Broadband

Double Leaky BucketInput

Overflow

output

Overflow

Page 13: CS 4594 Broadband

Double Leaky Bucket(another arrangement)Input

Overflow

output

Overflow

Page 14: CS 4594 Broadband

Double leaky buckets as a pair of gates

• pir = peak information rate• pbs = peak burst size• cir = committed information rate• cbr = Committed burst size

yes yes

cbspbs

pircir

no no

Page 15: CS 4594 Broadband

LBP schemes

• LBP=Leaky Bucket Policy

Page 16: CS 4594 Broadband

LBP Scheme type 1

Token pool

serverarriving cells

droppedcells

departing cells

• Arriving cells are dropped when no token is present in the token pool

Page 17: CS 4594 Broadband

LBP Scheme type 2

Token pool

serverarriving cells departing cells

• Arriving cells are tagged if not complient.

tagged cells

Page 18: CS 4594 Broadband

LBP Scheme type 3

Token pool

serverarriving cells

droppedcells

departing cells

• Arriving cells are placed in the queue if no token is present in the token pool

buffer

Page 19: CS 4594 Broadband

LBP Scheme type 4

Token pool

serverarriving cells departing cells

• Arriving cells are placed in the queue if no token is present in the token pool. Nonconforming cells are tagged.

buffer

tagged cells

Page 20: CS 4594 Broadband

GCRA and ATM Services

• GCRA is used to define usage parameters• CBR (Class A) (one GCRA)

– GCRA(1/PCR, CDVT)• rt-VBR (Class B) (two GCRAs)

– GCRA(1/PCR, CDVT)– GCRA(1/SCR, CDVT+BT)– ATM Forum defines 3 variations based on how the

CLP bit is used.• ABR

– uses GCRA with changing values for parameters.

Page 21: CS 4594 Broadband

ATM Conformance Definitions

• VBR.1 – Leaky bucket 1 sends CLP(0+1) compliant cells to leaky bucket 2 and discards the noncompliant cells. Leaky bucket 2 sends CLP(0+1) compliant cells to the network and discards noncompliant cells.

• VBR.2 – Leaky bucket 1 sends CLP(1) compliant cells to the network, sends CLP(0) compliant cells to leaky bucket 2, and discards CLP(0+1) noncompliant cells. Leaky bucket 2 sends CLP(0) compliant cells to the network and discards noncompliant cells.

• VBR.3 – Leaky bucket 1 sends CLP(1) compliant cells to the network, sends CLP(0) compliant cells to leaky bucket 2, and discards CLP(0+1) noncompliant cells. Leaky bucket 2 sends CLP(0) compliant cells to the network and tags noncompliant cells and sends them to the network.